A core network node may send an overload indicator capable of distinguishing plmns to an access network node when the core network node is overloaded; and the access network node may learn a plmn over which access control needs to be performed according to the overload indicator received. plmns are distinguished in access control according to an actual situation of overload of the network node caused by a plmn sharing the network, ensuring fairness in access control over terminals of all plmns sharing the network.

Patent
   9706475
Priority
Feb 14 2011
Filed
Feb 18 2016
Issued
Jul 11 2017
Expiry
Jan 16 2032
Assg.orig
Entity
Large
0
41
window open
1. A core network node for controlling access to a network, the core network node being shared by terminals accessing via multiple public land mobile networks (plmns), with multiple load thresholds of the core network node being preset corresponding respectively to the multiple plmns, the core network node being configured to, when an overload of the core network occurs, determine a plmn of the multiple plmns that causes the overload of the core network node by determining that a load from the plmn exceeds a load threshold of the core network node corresponding to the plmn, and send an access network node an overload indicator indicating the plmn, so that the access network node can learn the plmn over which access control needs to be performed according to the overload indicator and control access by a terminal via the plmn over which access control needs to be performed.
2. The core network node according to claim 1, wherein the overload indicator is an overload message including a plmn identifier.
3. The core network node according to claim 1, further configured to, when an overload of the core network node terminates, send the access network node an overload stop message carrying an identifier of the plmn over which access control needs to be stopped.

This is a divisional application of U.S. application Ser. No. 13/985,373, which itself is based on International Patent Application No. PCT/CN2012/070433 filed on Jan. 16, 2012, which claims priority to Chinese Patent Application No. 201110037367.7 filed on Feb. 14, 2011, the disclosure of all of which is incorporated by reference herein in its entirety.

The disclosure relates to the field of communications, and in particular to a method and a system for controlling access to a shared network.

Along with the development of mobile network services and automatic control technologies, a machine type communication mode, also referred to as a Machine to Machine (M2M) communication mode, has appeared. In this communication mode, at least one party involved in the communication is a machine device.

A narrow definition of the M2M is machine to machine communication, but in a broad sense, the M2M includes networked applications and services centred on intelligent interactions of a machine terminal. The M2M is based on an intelligent machine terminal, and may provide a user an information-based solution using a plurality of communication modes as access means to satisfy an information-based demand of the user for aspects such as monitoring, commanding and scheduling, data collection and measurement. The M2M may be applied to industry applications, household applications, personal applications and the like.

An object to which the M2M communication is directed is a machine, and communication behaviours are controlled automatically, that is, initiation and termination of the communication and control over some admittances and limitations during the communication are all automatic behaviours. Such behaviours depend on restriction and control of behaviours of the machine (i.e., the terminal in M2M communication) in the M2M communication. Behaviours of the terminal in the M2M communication are restricted by service subscription data, and a network manages the terminal in the M2M communication according to the service subscription data.

The most typical communication mode in the machine type communication is communication between the terminal and an application server, wherein the terminal is referred to as an MTC device, and the application server is referred to as an MTC server.

In the case of 2G/3G/LTE access, the M2M communication mainly uses a Packet Service (PS) network as an underlying bearer network to implement service layer communication between the MTC device and the MTC server. FIG. 1 is a schematic diagram of the architecture for an M2M communication entity to access an Evolved Packet System (EPS) according to a relevant art. As shown in FIG. 1, the underlying bearer network includes: an Evolved Universal Terrestrial Radio Access Network (E-UTRAN), a Mobility Management Entity (MME), a Serving Gateway (S-GW or SGW), a Packet Data Network Gateway (PDN GW, or P-GW, or PGW), a Home Subscriber Server (HSS), and a Policy and Charging Rules Function (PCRF) entity. Wherein, a main network element of the E-UTRAN is an evolved base station (Evolved NodeB, eNodeB, or eNB).

In FIG. 1, the MME is in charge of work related to a control plane such as mobility management, processing of non-access-layer signalling, and context management in user mobility management and the like. The S-GW is an access gateway device connected with the E-UTRAN, and is in charge of forwarding data between the E-UTRAN and the P-GW, and caching paging-waiting data. The P-GW is a border gateway of the EPS and a Packet Data Network (PDN), and is in charge of functions such as access of the PDN, and data forwarding between the EPS and the PDN. The PCRF is the Policy and Charging Rules Function entity, and is connected with an operator Internet Protocol (IP) service network via a receiving interface Rx to acquire service information, and the PCRF may also be connected with a gateway device in the network via a Gx interface, and is in charge of initiating IP bearer establishment, ensuring Quality of Service (QoS) of service data, and performing charging control. The HHS is used for managing subscription data of the user, and managing important context information of the user when accessing the network.

In addition, the MTC server may play the role of an Application Function (AF), and may be connected with the PCRF via the interface Rx to implement control over the bearer. Furthermore, the MTC server may play the role of an SIP AS, and may be connected with the HSS via an Sh interface to access application service data.

In FIG. 1, an MTC UE accesses an EPS network via the E-UTRAN (eNodeB). After being allocated with an IP address, the MTC UE may establish an IP channel with the MTC server, so as to implement upper-layer service communication with the MTC server. The IP channel established between the MTC UE and the MTC server is a logical IP channel.

At present, one way of implementing the M2M communication is to establish, on the IP channel between the MTC UE and the MTC server, a service layer interface protocol, through which the MTC UE server performs service data interaction with the MTC server, and the MTC server also implements control over the MTC UE.

Data communication between the MTC UE and the MTC server may be implemented via IP connection between the MTC UE and the MTC server. However, a demand for MTC monitoring is hard to be implemented on the IP connection: the MTC server needs to monitor an operational state of the MTC UE and dynamically learn the current state of the MTC UE in time, and when there is a change in the current state of the MTC UE, the MTC server needs to be informed timely. These changes in the state of the MTC UE may include: attachment of the MTC UE from the network, entering of the MTC UE into a non-connection state, releasing of a wireless connection by the MTC UE, and a change in the current location of the MTC UE. These changes in the state of the MTC UE may be referred to as MTC events. An MTC event to be monitored may generally be defined in MTC subscription data of an HLR/HSS, and be issued to a Serving GPRS Support Node (SGSN)/MME by the HLR/HSS through a flow of attachment of the MTC UE to the network. And detection of the MTC event generally needs to be performed by a network entity of a core network. For example, in the EPS network, a network element in charge of detecting the MTC event may be the MME/SGW/PGW or the like; and in a GPRS network, the network element in charge of detecting the MTC event may be the SGSN/GGSN and the like. When detected, the MTC event generally needs to be reported to the MTC server, so that the MTC server learns the operational status of the MTC UE in time.

Network sharing may provide a capability of sharing a same network node by Public Land Mobile Networks (PLMN) of multiple operators, avoid repeated network construction in a same area, and save network construction costs of the operators. In the shared network, an overloaded core network node sends an overload message to an access network node. After receiving the overload message, the access network node will not select the core network node as a serving node for the terminal, but select another useable network node instead. If there is no useable network node, the access network node will reject an access request of the terminal, or broadcast an Access Class Barring (ACB) parameter. When a load of the core network node becomes normal, the core network node sends an overload ending message to the access network node, which may then continue to select the core network node as the serving node for the terminal. However, the above technology does not distinguish the PLMNs in performing access control, and the terminal of an operator that does not cause overload of a shared network node is also treated in the same way, failing to ensure a fair access control over terminals of all PLMNs sharing the network.

In view of this, the main purpose of the disclosure is to provide a method and system for controlling access to a shared network, to distinguish PLMNs in performing access control, so as to ensure a fair access control over terminals of all PLMNs sharing the network.

In order to achieve the above purpose, the technical solution of the disclosure is implemented as follows.

A method for controlling access to a shared network, includes:

Wherein, the sending an overload indicator capable of distinguishing PLMNs to an access network node may be:

Wherein, the sending an overload indicator capable of distinguishing PLMNs may be: sending an overload message including a PLMN identifier; and determining, by the core network node, the PLMN over which access control needs to be performed may be: before sending the overload indicator, determining, by the core network node, the PLMN over which access control needs to be performed according to a current network load status.

Wherein, the access network node further may perform access control over a PLMN terminal in one of the following two modes:

The method may further include: when an overload terminates, sending, by the core network node, the access network node an overload stop message carrying an identifier of the PLMN over which access control needs to be stopped.

A system for controlling access to a shared network, includes a core network node and an access network node, wherein

Wherein, the core network node may be configured to, when sending the overload indicator capable of distinguishing PLMNs to the access network node,

Wherein, the core network node may be configured to, when sending the overload indicator capable of distinguishing PLMNs, send an overload message including a PLMN identifier; and

Wherein, the access network node may be further configured to perform access control over a PLMN terminal in one of the following two modes:

Wherein, the core network node may further be configured to, when an overload of the core network node terminates, send the access network node an overload stop message carrying an identifier of the PLMN over which access control needs to be stopped.

The method and the system of the disclosure distinguish the PLMNs in performing access control according to an actual situation of overload of the network node caused by a PLMN sharing the network, ensuring the fairness in performing access control over terminals of all PLMNs sharing the network. Therefore, the problem of unfairness in performing access control over terminals of different PLMNs in a network sharing scenario is solved.

FIG. 1 is the diagram of an architecture of an M2M network;

FIG. 2 is one flowchart of performing access control by a shared eNB using an extended access barring (EAB) mechanism in an EPS shared network according to an embodiment of the disclosure;

FIG. 3 is one flowchart of performing access control by a shared RNC using the EAB mechanism in a UMTS shared network according to an embodiment of the disclosure;

FIG. 4 is one flowchart of performing access control by the shared eNB by releasing a wireless connection of a UE in the EPS shared network according to an embodiment of the disclosure;

FIG. 5 is one flowchart of performing access control by the shared RNC by releasing a wireless connection of an MS in the UMTS shared network according to an embodiment of the disclosure;

FIG. 6 is another flowchart of performing access control by the shared eNB using the EAB mechanism in the EPS shared network according to an embodiment of the disclosure;

FIG. 7 is another flowchart of performing access control by the shared RNC using the EAB mechanism in the UMTS shared network according to an embodiment of the disclosure;

FIG. 8 is another flowchart of performing access control by the shared eNB by releasing the wireless connection of the UE in the EPS shared network according to an embodiment of the disclosure;

FIG. 9 is another flowchart of performing access control by the shared RNC by releasing the wireless connection of the MS in the UMTS shared network according to an embodiment of the disclosure; and

FIG. 10 is a schematic flowchart of controlling access to a shared network according to an embodiment of the disclosure.

Generally speaking, when an overload of a core network node in a shared network occurs, an overload message may be sent to an access network node. If the core network node is shared by multiple PLMNs, then it is required to first judge which PLMNs cause the overload of the core network node or loads of which PLMNs exceed a predefined threshold, and to carry a PLMN identifier in the overload message and optionally carry another access control parameter (such as an access control type, a waiting time length and the like).

After receiving the overload message, the access network node learns the PLMNs over which access control needs to be performed according to the PLMN identifier in the overload message.

The access network node may perform access control over a PLMN terminal in the following two modes:

An overload status of the core network node may also be monitored by an O&M (operation and maintenance) system. For example, a load threshold of a shared network node is preset in the O&M, and when monitoring that the load of the core network node reaches the threshold, the O&M sends the access network node the overload message carrying the identifier of the PLMN over which access control needs to be performed and other relevant parameters. After the access network node receives the overload message, the subsequent processing is the same as the corresponding technical content mentioned above. The load threshold may be set as the threshold of the load of the whole node, or different thresholds may be set according to PLMNs respectively.

When the overload of the core network node in the shared network has terminated, the core network node sends an overload stop message to the access network node. If the core network node is shared by multiple PLMNs, then an identifier of the PLMN over which access control is to be stopped needs to be carried in the overload stop message. After receiving the overload stop message, the access network node stops the access control over the corresponding PLMN terminal.

Note that in a specific operation, the shared core network node determines the PLMN over which access control needs to be performed according to the current load status. The shared core network node carries the identifier of the PLMN over which access control needs to be performed in the overload message sent to a shared access network node. The shared access network node formulates the EAB parameter respectively for each PLMN over which access control needs to be performed, and sends the EAB parameter to the terminal in the broadcast message. The shared access network node stores the identifier of the PLMN over which access control needs to be performed, and releases the wireless connection initiated subsequently of the terminal of the PLMN over which access control is required. When the overload of the shared core network node terminates, the shared core network node sends the shared access network node the overload stop message carrying the identifier of the PLMN over which access control needs to be stopped.

The disclosure is elaborated below with reference to the figures and embodiments.

A scenario where both the core network and an access network are shared.

As shown in FIG. 2, a specific implementation flow of performing access control by a shared eNB using an EAB mechanism in an EPS shared network is as follows:

As shown in FIG. 3, a specific implementation flow of performing access control by a shared RNC using the EAB mechanism in a UMTS shared network is as follows:

As shown in FIG. 4, a specific implementation flow of performing access control by the shared eNB by releasing the wireless connection of the UE in the EPS shared network is as follows:

As shown in FIG. 5, a specific implementation flow of performing access control by the shared RNC by releasing the wireless connection of the MS in the UMTS shared network is as follows:

A scenario where only the access network is shared.

As shown in FIG. 6, a specific implementation flow of performing access control by the shared eNB using the EAB mechanism in the EPS shared network is as follows:

As shown in FIG. 7, a specific implementation flow of performing access control by the shared RNC using the EAB mechanism in the UMTS shared network is as follows:

As shown in FIG. 8, a specific implementation flow of performing access control by the shared eNB by releasing the wireless connection of the UE in the EPS shared network is as follows:

As shown in FIG. 9, a specific implementation flow of performing access control by the shared RNC by releasing the wireless connection of the MS in the UMTS shared network is as follows:

A scenario where only the core network is shared.

In the scenario where only the core network node is shared while access network nodes are separate, an overloaded core network node needs to determine PLMNs over which access control is to be performed. The shared core network node sends an overload message to an access network node over which access control needs to be performed. When the overload status of the shared core network node terminates, the shared core network node needs to send an overload stop message to an access network nodes over which access control is being performed.

Note that the role of an indicator such as the overload beginning message and the overload message including the PLMN identifier is to ensure that the access network node can distinguish the PLMNs, such that a PLMN over which access control needs to be performed is determined. It may be seen that, in actual applications, there is no need to limit the overload indicator capable of distinguishing the PLMNs as long as the PLMNs can be distinguished.

As may be seen with reference to various aforementioned embodiments, a mode for controlling access to a shared network of the disclosure may be expressed as a flow shown in FIG. 10, which includes the following steps:

To sum up, for both the method and the system, the techniques for controlling access to a shared network according to the disclosure distinguish the PLMNs in performing access control according to an actual situation of overload of the network node caused by a PLMN sharing the network, ensuring the fairness in performing access control over terminals of all PLMNs sharing the network. Therefore, the problem of unfairness in performing access control over terminals of different PLMNs in a network sharing scenario is solved.

What described are merely preferable embodiments of the disclosure, and are not intended to limit the scope of protection of the disclosure.

Deng, Yun, Zhi, Chunxia, Xie, Baoguo

Patent Priority Assignee Title
Patent Priority Assignee Title
8331224, Nov 23 2009 Telefonaktiebolaget L M Ericsson Self-management of mobility management entity (MME) pools
8428610, Nov 17 2008 Cisco Technology, Inc Dynamic load balancing in a communication network
8447302, Apr 26 2006 TELEFONAKTIEBOLAGET LM ERICSSON PUBL Network initiated mobility management for mobile terminals
8504055, Jan 09 2009 TELEFONAKTIEBOLAGET L M ERICSSON PUBL Method and arrangement for load balancing in a wireless communication system
8611280, Jan 14 2010 TELCORDIA LEGACY INC Public land mobile network selection procedures for simultaneous network connectivity through multiple accesses
8660009, Jan 30 2008 Telefonaktiebolaget L M Ericsson (publ); TELEFONAKTIEBOLAGET L M ERICSSON PUBL Core network processing load reduction
8908619, Aug 27 2010 LG Electronics Inc. MAC PDU signaling and operating methods for access class barring and back-off control for large-scale radio access network
8995262, Nov 17 2008 Cisco Technology, Inc Dynamic load balancing in a communication network
9001655, Jun 07 2010 InterDigital Patent Holdings, Inc Method and apparatus for transmitting service request messages in a congested network
9066277, Feb 16 2010 Samsung Electronics Co., Ltd.; SAMSUNG ELECTRONICS CO , LTD Method and apparatus for controlling network access of UE in wireless communication system
9066280, Jan 10 2011 LG Electronics Inc Method for restricting the cell access of a terminal in a wireless communication system, and apparatus therefor
9125213, Jan 07 2011 LG Electronics Inc Method and apparatus for verifying release of LIPA PDN connection in wireless communication system
9210650, Jan 21 2011 ZTE Corporation Terminal access method and device
20060073831,
20070253359,
20100281157,
20110058480,
20120082099,
20130010758,
20130044596,
20130272268,
20130288679,
20140056134,
CN101060698,
CN101061738,
CN101193394,
CN101730033,
CN101742415,
CN101801022,
CN101959133,
CN101969635,
CN1756405,
CN1852588,
EP1626605,
EP2262302,
JP2010268249,
WO2008048158,
WO2009096833,
WO2010080056,
WO2010102127,
WO2013023608,
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Aug 13 2013ZHI, CHUNXIAZTE CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0550250478 pdf
Aug 13 2013DENG, YUNZTE CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0550250478 pdf
Aug 13 2013XIE, BAOGUOZTE CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0550250478 pdf
Feb 18 2016ZTE Corporation(assignment on the face of the patent)
Feb 26 2021ZTE CorporationGUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP , LTD ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0561440080 pdf
Date Maintenance Fee Events
Dec 30 2020M1551: Payment of Maintenance Fee, 4th Year, Large Entity.


Date Maintenance Schedule
Jul 11 20204 years fee payment window open
Jan 11 20216 months grace period start (w surcharge)
Jul 11 2021patent expiry (for year 4)
Jul 11 20232 years to revive unintentionally abandoned end. (for year 4)
Jul 11 20248 years fee payment window open
Jan 11 20256 months grace period start (w surcharge)
Jul 11 2025patent expiry (for year 8)
Jul 11 20272 years to revive unintentionally abandoned end. (for year 8)
Jul 11 202812 years fee payment window open
Jan 11 20296 months grace period start (w surcharge)
Jul 11 2029patent expiry (for year 12)
Jul 11 20312 years to revive unintentionally abandoned end. (for year 12)